A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.
☆17Mar 3, 2023Updated 3 years ago
Alternatives and similar repositories for the-nurse
Users that are interested in the-nurse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- One of the few OSINT tools non-USA focused, designed to retrieve and verify data for Mexican citizens in the OSINT investigations context…☆14Mar 12, 2023Updated 3 years ago
- Uses the Mozilla Location Services API to determine the location of a device based on the Wi-Fi access points in its vicinity.☆17Feb 15, 2023Updated 3 years ago
- One of the few OSINT tools focused on Mexican citizens, retrieve and verify data about a Security Social Number aka IMSS from a given CU…☆15Apr 6, 2023Updated 3 years ago
- OSINT tool to verify phone numbers in Mexico.☆20Mar 12, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Obtain an email full profile including reputation, consistency, deliverability, social networks account linked, plus more data points.☆42Mar 22, 2023Updated 3 years ago
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆37Mar 3, 2023Updated 3 years ago
- This tool allows you to get the approximate location of a Bluetooth device using the long-awaited: Wigle.net API.☆38Mar 3, 2023Updated 3 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆24Apr 29, 2023Updated 3 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆112Feb 28, 2023Updated 3 years ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆109May 7, 2024Updated 2 years ago
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆43May 6, 2023Updated 3 years ago
- ☆10Apr 18, 2019Updated 7 years ago
- Python program for installing many tools automatically☆15Dec 31, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A simple way to track *unix devices☆21Mar 7, 2023Updated 3 years ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- WhatsApp Bot with rich features☆13Aug 6, 2022Updated 3 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆18Nov 5, 2018Updated 7 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- A ddos tool for penetration of websites☆15Dec 13, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Golang的工具库(Tools of Golang)☆14Apr 30, 2026Updated last week
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆20Dec 31, 2023Updated 2 years ago
- BugSquasher Bug Bounty Tools List☆21Feb 2, 2023Updated 3 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Apr 11, 2026Updated 3 weeks ago
- A tool for inspecting and analyzing mobile application storage files.☆51May 15, 2025Updated 11 months ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆26Mar 26, 2021Updated 5 years ago
- ☆13Mar 22, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to scrape the ipfs network for information on the number of peers in the network.☆21Mar 22, 2024Updated 2 years ago
- Golang implementation of a BIP32, BIP44, BIP49 and BIP84 compatible hierarchical determinstic wallet☆14Jul 25, 2018Updated 7 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Grab the content of lots of websites in parallel☆18Jan 21, 2024Updated 2 years ago
- eCPPTv2 Notes☆13Jun 13, 2021Updated 4 years ago
- Easily turn large sets of image urls to an image dataset. Can download, resize and package 100M urls in 20h on one machine.☆14May 24, 2024Updated last year
- Contains nuclei templates for security testing and POCs.☆17Oct 19, 2024Updated last year